Call: Law
Enforcement capabilities 2: Detection and analysis of terrorist-related content on the Internet

A challenge-based approach will bring together resources and
knowledge across different fields, technologies and disciplines, including social sciences and the humanities. This will cover
activities from research to market with a new focus on innovation-related activities, such as piloting, demonstration, test-beds,
and support for public procurement and market uptake.Funding focuses on the following
challenges:

Health, demographic change and wellbeing;

Food security, sustainable agriculture and forestry,
marine and maritime and inland water research, and the Bioeconomy;

Secure, clean and efficient energy;

Smart,
green and integrated transport;

Climate action, environment, resource efficiency and raw materials;

Europe
in a changing world - inclusive, innovative and reflective societies;

Secure societies - protecting freedom and security
of Europe and its citizens.

Description of programme"Secure societies – Protecting freedom and security of Europe and its citizens"

The primary aims of the Secure Societies Challenge are:

to enhance the resilience of our society against
natural and man-made disasters, ranging from the development of new crisis management tools to communication interoperability,
and to develop novel solutions for the protection of critical infrastructure;

to fight crime and terrorism ranging
from new forensic tools to protection against explosives;

to improve border security, ranging from improved maritime
border protection to supply chain security and to support the Union's external security policies including through conflict
prevention and peace building;

and to provide enhanced cyber-security, ranging from secure information sharing to
new assurance models

Title

Fight Against Crime and Terrorism

Description of
call"Fight Against Crime and Terrorism"

The ambition of this call is both to avoid an incident and to mitigate
its potential consequences. This requires new technologies and capabilities for fighting and preventing crime (including cyber-crime),
illegal trafficking and terrorism (including cyber-terrorism), including understanding and tackling terrorist ideas and beliefs
to also avoid aviation related threats.

Law Enforcement capabilities 2: Detection and
analysis of terrorist-related content on the Internet

Description of call"Law
Enforcement capabilities 2: Detection and analysis of terrorist-related content on the Internet"

Due to the ease
of publishing information on the Internet (Web site, blogs, social networks, newsgroups, forums, etc.), terrorists increasingly
exploit the Internet as a communication, intelligence, training, recruitment and propaganda tool where they can safely communicate
with their affiliates, coordinate action plans, raise funds, and introduce new supporters or recruits into their networks.
In order to cope with the dangers involved in the use of Internet by global terrorist organizations and grassroots terrorist
cells, more efficient and effective automated techniques are required. Despite the often explicit (or at least not disguised)
content of these web-sites, especially when used for propaganda, the huge amount of somehow related, yet not illegal, sites,
represents a major obstacle to the reliable and fast analysis of their contents. Research should therefore develop and apply
new and/or improved data and text and multimedia mining methods to detect, categorize, analyse, reason over, and summarize
terrorist-generated content group information from several sources that supports same history, and isolate potential sources
describing different ideas, that could be intended to generate “disinformation” or fake evidences to distract
LEA from real scenarios. Aside this, modes of finding sources of data, capturing and preserving data for forensic analysis,
authenticating images and linking videos and conversely proving multimedia data falsification, should be investigated.